Network Attacks and Exploitation

Network Attacks and Exploitation

A Framework
1. Aufl.

von: Matthew Monte

34,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 07.07.2015
ISBN/EAN: 9781118987087
Sprache: englisch
Anzahl Seiten: 216

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.


Incorporate offense and defense for a more effective networksecurity strategy

Network Attacks and Exploitation provides a clear,comprehensive roadmap for developing a complete offensive anddefensive strategy to engage in or thwart hacking and computerespionage. Written by an expert in both government and corporatevulnerability and security operations, this guide helps youunderstand the principles of the space and look beyond theindividual technologies of the moment to develop durablecomprehensive solutions. Numerous real-world examples illustratethe offensive and defensive concepts at work, including Conficker,Stuxnet, the Target compromise, and more. You will find clearguidance toward strategy, tools, and implementation, with practicaladvice on blocking systematic computer espionage and the theft ofinformation from governments, companies, and individuals.

Assaults and manipulation of computer networks are rampantaround the world. One of the biggest challenges is fitting theever-increasing amount of information into a whole plan orframework to develop the right strategies to thwart these attacks.This book clears the confusion by outlining the approaches thatwork, the tools that work, and resources needed to apply them.
* Understand the fundamental concepts of computer networkexploitation
* Learn the nature and tools of systematic attacks
* Examine offensive strategy and how attackers will seek tomaintain their advantage
* Understand defensive strategy, and how current approaches failto change the strategic balance

Governments, criminals, companies, and individuals are alloperating in a world without boundaries, where the laws, customs,and norms previously established over centuries are only beginningto take shape. Meanwhile computer espionage continues to grow inboth frequency and impact. This book will help you mount a robustoffense or a strategically sound defense against attacks andexploitation. For a clear roadmap to better network security,Network Attacks and Exploitation is your complete andpractical guide.
<p>Introduction xvii</p> <p><b>Chapter 1 Computer Network Exploitation 1</b></p> <p>Operations 4</p> <p>Operational Objectives 5</p> <p>Strategic Collection 6</p> <p>Directed Collection 7</p> <p>Non-Kinetic Computer Network Attack (CNA) 7</p> <p>Strategic Access 9</p> <p>Positional Access 9</p> <p>CNE Revisited 11</p> <p>A Framework for Computer Network Exploitation 11</p> <p>First Principles 12</p> <p>Principles 12</p> <p>Themes 14</p> <p>Summary 15</p> <p><b>Chapter 2 The Attacker 17</b></p> <p>Principle of Humanity 17</p> <p>Life Cycle of an Operation 18</p> <p>Stage 1: Targeting 19</p> <p>Stage 2: Initial Access 22</p> <p>Stage 3: Persistence 24</p> <p>Stage 4: Expansion 25</p> <p>Stage 5: Exfiltration 26</p> <p>Stage 6: Detection 26</p> <p>Principle of Access 27</p> <p>Inbound Access 27</p> <p>Outbound Access 29</p> <p>Bidirectional Access 35</p> <p>No Outside Access 35</p> <p>Access Summary 36</p> <p>Principle of Economy 37</p> <p>Time 37</p> <p>Targeting Capabilities 37</p> <p>Exploitation Expertise 38</p> <p>Networking Expertise 38</p> <p>Software Development Expertise 39</p> <p>Operational Expertise 40</p> <p>Operational Analysis Expertise 40</p> <p>Technical Resources 41</p> <p>Economy Summary 41</p> <p>Attacker Structure 41</p> <p>Summary 43</p> <p><b>Chapter 3 The Defender 45</b></p> <p>Principle of Humanity 45</p> <p>Humanity and Network Layout 46</p> <p>Humanity and Security Policy 47</p> <p>Principle of Access 48</p> <p>The Defensive Life Cycle 49</p> <p>Principle of Economy 51</p> <p>The Helpful Defender 53</p> <p>Summary 54</p> <p><b>Chapter 4 Asymmetries 55</b></p> <p>False Asymmetries 56</p> <p>Advantage Attacker 59</p> <p>Motivation 60</p> <p>Initiative 61</p> <p>Focus 62</p> <p>Effect of Failure 62</p> <p>Knowledge of Technology 64</p> <p>Analysis of Opponent 64</p> <p>Tailored Software 65</p> <p>Rate of Change 66</p> <p>Advantage Defender 67</p> <p>Network Awareness 68</p> <p>Network Posture 68</p> <p>Advantage Indeterminate 69</p> <p>Time 69</p> <p>Efficiency 70</p> <p>Summary 71</p> <p><b>Chapter 5 Attacker Frictions 73</b></p> <p>Mistakes 74</p> <p>Complexity 74</p> <p>Flawed Attack Tools 75</p> <p>Upgrades and Updates 77</p> <p>Other Attackers 78</p> <p>The Security Community 80</p> <p>Bad Luck 81</p> <p>Summary 81</p> <p><b>Chapter 6 Defender Frictions 83</b></p> <p>Mistakes 83</p> <p>Flawed Software 84</p> <p>Inertia 86</p> <p>The Security Community 87</p> <p>Complexity 89</p> <p>Users 91</p> <p>Bad Luck 92</p> <p>Summary 92</p> <p><b>Chapter 7 Offensive Strategy 93</b></p> <p>Principle 1: Knowledge 95</p> <p>Measuring Knowledge 96</p> <p>Principle 2: Awareness 97</p> <p>Measuring Awareness 98</p> <p>Principle 3: Innovation 98</p> <p>Measuring Innovation 99</p> <p>Defensive Innovation 100</p> <p>Principle 4: Precaution 101</p> <p>Measuring Precaution 103</p> <p>Principle 5: Operational Security 105</p> <p>Minimizing Exposure 106</p> <p>Minimizing Recognition 107</p> <p>Controlling Reaction 108</p> <p>Measuring Operational Security 109</p> <p>Principle 6: Program Security 110</p> <p>Attacker Liabilities 110</p> <p>Program Security Costs 112</p> <p>Measuring Program Security 120</p> <p>Crafting an Offensive Strategy 121</p> <p>Modular Frameworks 124</p> <p>A Note on Tactical Decisions 126</p> <p>Summary 127</p> <p><b>Chapter 8 Defensive Strategy 129</b></p> <p>Failed Tactics 130</p> <p>Antivirus and Signature-Based Detection 130</p> <p>Password Policies 132</p> <p>User Training 134</p> <p>Crafting a Defensive Strategy 135</p> <p>Cloud-Based Security 143</p> <p>Summary 145</p> <p><b>Chapter 9 Offensive Case Studies 147</b></p> <p>Stuxnet 148</p> <p>Access 148</p> <p>Economy 149</p> <p>Humanity 149</p> <p>Knowledge 149</p> <p>Awareness 149</p> <p>Precaution 150</p> <p>Innovation 151</p> <p>Operational Security 151</p> <p>Program Security 153</p> <p>Stuxnet Summary 154</p> <p>Flame 154</p> <p>Gauss 157</p> <p>Dragonfly 159</p> <p>Red October 160</p> <p>APT1 162</p> <p>Axiom 164</p> <p>Summary 165</p> <p>Epilogue 167</p> <p>Appendix Attack Tools 169</p> <p>Antivirus Defeats 169</p> <p>Audio/Webcam Recording 170</p> <p>Backdoor 170</p> <p>Bootkit 171</p> <p>Collection Tools 171</p> <p>Exploits 171</p> <p>Fuzzer 172</p> <p>Hardware-based Trojan 172</p> <p>Implant 173</p> <p>Keystroke Logger 173</p> <p>Network Capture 173</p> <p>Network Survey 173</p> <p>Network Tunnel 174</p> <p>Password Dumpers and Crackers 174</p> <p>Packer 175</p> <p>Persistence Mechanism 175</p> <p>Polymorphic Code Generator 177</p> <p>Rootkit 178</p> <p>Screen Scraper 178</p> <p>System Survey 178</p> <p>Vulnerability Scanner 178</p> <p>References 179</p> <p>Bibliography 189</p> <p>Index 193</p>
MATTHEW MONTE is a security expert with 15 years experience developing computer security tools and strategies for corporations and the U.S. government. His career includes technical and leadership positions in industry and the U.S. intelligence community. He holds a Master of Engineering in Computer Science degree from Cornell University.
<p><b>Enhance network security with both offensive and defensive strategies</b> <p>It's not enough just to defend your network against attack. For truly effective security, you need both defensive and offensive strategies in a unified framework. This book provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. <p>Written by an expert in both government and corporate vulnerability and security operations, this guide takes you beyond the individual technologies to help you develop durable, far-reaching solutions. More than introducing tools and how to use them, it provides an essential understanding of the inherent properties of computer operations and the principles of network attack and exploitation. Supported by real-world examples, this book outlines the approaches that work, the tools that work, and the resources needed to apply them. You will: <ul> <li>Understand the fundamental concepts of computer exploitation</li> <li>Learn the nature of systematic attacks and the tools that are used</li> <li>Examine offensive strategies and how hackers will attempt to maintain their advantage</li> <li>Gain a better understanding of defensive strategy</li> <li>See how current approaches fail to change the strategic balance</li> <li>Be able to mount a robust offense or a strategically sound defense against attacks and exploitation</li> </ul> <p>Where network security is concerned, we operate in a world where laws and customs are still evolving. In this book, you will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information.

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
109,99 €